Ronny Vaningh
22
Abonné
- Présentations
- Documents
- Infographies
IoT Story: From Edge to HDP
DataWorks Summit
•
il y a 5 ans
Covert Attack Mystery Box: A few novel techniques for exploiting Microsoft “features”
Beau Bullock
•
il y a 5 ans
BlueHat v17 || Securing Windows Defender Application Guard
BlueHat Security Conference
•
il y a 6 ans
Elastic - From 50 to 270, how to scale a distributed engineering team
Sylvain Wallez
•
il y a 6 ans
Practical Phishing Automation with PhishLulz - KiwiCon X
Michele Orru
•
il y a 7 ans
Six Degrees of Domain Admin - BloodHound at DEF CON 24
Andy Robbins
•
il y a 7 ans
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open Source Tools
Jason Trost
•
il y a 8 ans
SplunkSummit 2015 - Splunking the Endpoint
Splunk
•
il y a 8 ans
Large-Scale Stream Processing in the Hadoop Ecosystem - Hadoop Summit 2016
Gyula Fóra
•
il y a 8 ans
Streaming Analytics - Comparison of Open Source Frameworks and Products
Kai Wähner
•
il y a 8 ans
Automatic MIME Attachments Triage
Xavier Mertens
•
il y a 8 ans
BSIDES DETROIT 2015: Data breaches cost of doing business
Joel Cardella
•
il y a 8 ans
Detecting Hacks: Anomaly Detection on Networking Data
James Sirota
•
il y a 8 ans
Pragmatic Security and Rugged DevOps - SXSW 2015
James Wickett
•
il y a 9 ans
Hortonworks Technical Workshop: HBase For Mission Critical Applications
Hortonworks
•
il y a 9 ans
Apache storm vs. Spark Streaming
P. Taylor Goetz
•
il y a 9 ans
How JESS3 Saved Christmas!
JESS3
•
il y a 9 ans
Measuring the IQ of your Threat Intelligence Feeds (#tiqtest)
Alex Pinto
•
il y a 9 ans
Applied Detection and Analysis Using Flow Data - MIRCon 2014
chrissanders88
•
il y a 9 ans
Developing Real-Time Data Pipelines with Apache Kafka
Joe Stein
•
il y a 10 ans